Improper Access Control Affecting org.apache.cxf:cxf-rt-rs-security-sso-oidc Open this link in a new tab package, versions [3.3.0,3.3.4) [3.2.0,3.2.11)


0.0
medium
  • Attack Complexity

    Low

  • Confidentiality

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGAPACHECXF-480440

  • published

    6 Nov 2019

  • disclosed

    6 Nov 2019

  • credit

    Unknown

How to fix?

Upgrade org.apache.cxf:cxf-rt-rs-security-sso-oidc to version 3.3.4, 3.2.11 or higher.

Overview

org.apache.cxf:cxf-rt-rs-security-sso-oidc is an Apache CXF Runtime OpenId Connect library.

Affected versions of this package are vulnerable to Improper Access Control. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client.